Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Understanding Security Regulations in the Financial Services Industry View the associated infographic here: https://www.sans.org/reading-room/whitepapers/analyst/infographic-financial-apps-risk-37042 Copyright SANS Institute Author Retains Full Rights Understanding Security Regulations in the Financial Services Industry Written by David Hoelzer June 2016 Sponsored by Veracode ©2016 SANS™ Institute The world of financial services and banking regulation is labyrinthine, to say the least. The myriad laws and regulatory rules financial institutions must comply with can seem quite complex when viewed as discrete requirements, but from the application security point of view, all of these requirements are focused on protecting consumer information and accounts. Compliance requires that risk assessments account for the personally identifiable information (PII) being processed, stored and accessed within the applications. Assessments must then generate reasonable controls to mitigate risks, along with documented policies and procedures, training of developers handling consumer PII, and validation of application security and detection capabilities. Looking at risk from the point of view of the consumer allows security and risk management teams to better inform the operations group of how regulators view the organization. This is a critical connection to make because, obviously, no financial services organization wants to receive a CID1, NORA2 or PARR3 for failing to protect consumer accounts and data. Financial organizations recognize that compliance does not necessarily mean better security.8 Because compliance can be timeconsuming and expensive, some financial services organizations go to great lengths to avoid certain products and services to exempt themselves from additional regulatory requirements. But holding back on new applications because of compliance procedures is not a good business strategy. Neither is carefully crafting the narrative to avoid regulation. Interpreting Regulations Virtually all financial services companies and financial institutions are subject to the Gramm-Leach-Bliley Act (GLBA),4 while the Dodd-Frank Wall Street Reform and Consumer Protection Act provides the measure of what is “reasonable and appropriate” for protecting consumer data in financial systems.5 The Federal Trade Commission (FTC) and the Consumer Financial Protection Bureau (CFPB) oversee the enforcement of these regulations. The Sarbanes-Oxley Act (SOX)6 is a regulation that applies more to protecting investor information and systems. SOX is somewhat vague about what it means to protect information assets, but GLBA is quite specific, requiring information security training, specific policies, scanning and other activities. For those processing financial transactions, the Payment Card Industry Data Security Standard (PCI DSS) for financial services applies only to financial services companies processing payment cards. Only the portion of the business that is actually processing those cards falls under PCI.7 Grappling with more stringent compliance criteria, while initially requiring more effort, typically yields simplified compliance processes across all applications and more robust operations. After all, the point of the regulation is not to hamper operations but to simply require good practices! The key to this simplification is boiling down the multiple regulatory guidelines into a 1 2 3 4 5 6 7 8 SANS ANALYST PROGRAM C ivil Investigative Demand Notice and Opportunity to Respond and Advise Potential Action and Request for Response www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act www.ftc.gov/enforcement/statutes/dodd-frank-wall-street-reform-and-consumer-protection-act-titles-x-and-xiv www.soxlaw.com www.pcisecuritystandards.org/document_library?category=pcidss&document=pci_dss www.sans.org/reading-room/whitepapers/privacy/gramm-leach-bliley-act-g-l-b-practices-network-security-682 1 Understanding Security Regulations in the Financial Services Industry formula that can prove compliance while also actually reducing risk. See Table 1. Table 1. Protecting Consumer Apps with Regulations Regulation and Mandate Security Requirements Summarized Establish and maintain an inventory of systems and applications containing and processing critical information. Designate responsible party. GLBA Safeguards Rule9 “…financial institutions must protect the consumer information they collect.” Identify applications hosting or transacting customer information. Assess risks to customer information. Design, monitor and test assessment program. Hold service providers to same standards. Continue to evaluate and adjust programs. Dodd-Frank10 “To promote the financial stability of the United States by improving accountability and transparency in the financial system.” 11 SOX12 “To protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws, and for other purposes.”13 You must be ready to prove your security controls and document them. This includes time to detect, respond and report breaches impacting sensitive data. Size and maturity of the organization is a consideration in what is reasonable. Sections 302 and 404 indirectly charge information systems to support accounting and oversight for the accuracy of reporting. Advice for achieving this is augmented by other frameworks such as COBIT14 and the CIS Critical Security Controls.15 Protect cardholder data “Maintaining payment security is required for all entities that store, process or transmit cardholder data.” 17 Manage vulnerabilities Provide strong access controls Monitor and test Maintain policy Establish regular periodic scanning so that future activities remain fact-based. Scan applications regularly for vulnerabilities. Establish criteria for the prioritization of vulnerabilities and remediation activities. Pay special attention to internally or customdeveloped applications with dynamic and static analysis. Sets the baseline for what is “reasonable and appropriate” security around consumer financial data. PCI DSS16 Specific Controls Establish secure coding as a culture, and provide qualified training on secure coding. Establish and document a secure development life-cycle approach that fits your business and developers. Combine functional testing and security testing of applications: Assess for operational bugs and coding errors. Establish and enforce secure coding practices such as pair programming and code review. Establish and enforce segregated development, testing and production environments. Conduct periodic threat modeling activities for all critical applications. Outcomes should inform information security monitoring and fraud detection activities. Perform regular application penetration testing, and inform the regular vulnerability scanning process to provide ongoing regression testing of applications. Establish and maintain policies and procedures. Continuously improve your visibility, assessment and security programs. Periodically audit the controls structure, seeking to validate the effectiveness of the risk management activities listed above and of the controls themselves. www.ftc.gov/tips-advice/business-center/guidance/financial-institutions-customer-information-complying www.ftc.gov/enforcement/statutes/dodd-frank-wall-street-reform-and-consumer-protection-act-titles-x-and-xiv 11 www.gpo.gov/fdsys/pkg/PLAW-111publ203/html/PLAW-111publ203.htm 12 www.soxlaw.com 13 www.sec.gov/about/laws/soa2002.pdf 14 www.isaca.org/cobit 15 https://benchmarks.cisecurity.org/downloads/compliance/ 16 www.pcisecuritystandards.org/pci_security/ 17 www.pcisecuritystandards.org/pci_security/maintaining_payment_security 9 10 SANS ANALYST PROGRAM 2 Understanding Security Regulations in the Financial Services Industry Bake in security rather than bolting it on. Know what data you have, where it is and how it’s changing. Identifying inadequately addressed risks is not helpful unless it leads to effective controls to mitigate them. Periodic audits must be performed to verify that the controls are, in fact, effective. Due Care Enforcement agencies now recognize that perfection is not possible. Enforcement attorneys typically retain technical experts to assist them in determining potential liability and possible negligence. In the past, hiring experts was considered “due care.”18 Now, experts are being asked whether the actions of the institution were “reasonable and appropriate.” What, precisely, does this mean? Let’s examine the question in two ways. Bake in security rather than bolting it on. What is reasonable? If a thorough vulnerability scan is run against any sizable organization on any day of the year, there will be vulnerabilities. The question is whether the organization, based on its size and age, acted in a reasonable way. A large, wellestablished business would be hard-pressed to claim that six months or more is a reasonable patching time frame. At the same time, it likely is not reasonable for any size organization to remediate a serious vulnerability in only minutes or hours. What is appropriate? The question to ask when a breach happens is, “Was the organization defending itself in a reasonable and appropriate way?” What does this mean? “Appropriate” requires careful consideration of whether the possible protections were based on the sensitivity of what was bring protected, and the size and maturity of the organization. The following real-life example involving a small payment products organization offers a measure of what is reasonable and appropriate. 18 SANS ANALYST PROGRAM F or a thorough discussion of due care, particularly with regard to liability, see http://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1553&context=law_and_economics 3 Understanding Security Regulations in the Financial Services Industry No Harm, No Foul? Good News/Bad News The consent order entered into by the CFPB and Dwolla, a small organization offering financial services in the form of payment products, provides insight into reasonable and appropriate measures taken to protect consumer data.19 Dwolla was ordered to pay a $100,000 civil fine, retrain its staff in security of sensitive data, improve its financial systems, and stop making false claims. Specifically, according to the enforcement action, Dwolla misrepresented its data and application security practices by “falsely claiming its data security practices ‘exceed’ or ‘surpass’ industry security standards: Contrary to its claims, Dwolla failed to employ reasonable and appropriate measures to protect data obtained from consumers from unauthorized access.” Dwolla was also fined for “falsely claiming its ‘information is securely encrypted and stored’: Dwolla did not encrypt some sensitive consumer personal information, and released applications to the public before testing whether they were secure.” First the bad news: There was no claim of breach. There were, however, false claims for consumer data protection that were detected and challenged by authorities. This is groundbreaking, legally. In the past, organizations could easily fall back on the claim that there was no actual harm. In the absence of any demonstrable harm, how can there be an actual cause for a complaint? Interestingly, the same rationale is not applied when it comes to issues of physical safety. For instance, fire code violations can easily result in significant fines due to the potential for physical harm even if there hasn’t been a fire. It could be that information security regulators—and possibly in the future, the legislators as well—are beginning to apply the same regulatory rigor to the safety of financial and personal information. Now the good news: In a sense, the requirements in the consent order could be viewed as a step-by-step checklist of activities and controls that must exist as a foundation for information security. These items, in conjunction with the CIS Critical Security Controls,20 allow management to set and expect concrete deliverables from information security overall and security of applications in particular. This is really good news for compliance-conscious organizations. Compliance Road Map Specific requirements for risk assessment and periodic audits should serve as metrics to assess whether proper controls are, in fact, being created and that they are actually effective. Fact-Based Risk Assessment For risk assessment processes to be reasonable and appropriate, they must be factbased and the organization must reasonably act to prioritize and address identified risks. When we say “fact-based,” we are saying that actions taken by the organization must be informed by actual data. For example, an organization conducts a phishing exercise and is informed that employees are easily fooled. Based on this data, the organization crafts policy and training to address the issue. Periodically, the organization would then verify that the control is effective through testing, provably remediating the issue. SANS ANALYST PROGRAM 19 www.consumerfinance.gov/about-us/newsroom/cfpb-takes-action-against-dwolla-for-misrepresenting-data-security-practices/ 20 www.cisecurity.org/critical-controls.cfm 4 Understanding Security Regulations in the Financial Services Industry High-level risk assessment is typically a fairly simple thing. For example, when it comes to financial organizations, it’s known that bad actors will seek to perform unauthorized transactions, establish fraudulent and fungible identities, and misappropriate customer PII. Assessments must take into account these types of activities. Lower level assessment then follows. For example, if the organization has access to source code, assessment would then focus on functional bugs such as SQL injection within the application, as well as a review of the code. Scanning and Remediation The first two CIS Critical Security Controls require that the organization develop and maintain an inventory of systems and networks. This inventory must include not only how many systems there are, but where they are, what they are, what data they process, and how they are configured. After this baseline information has been established and a reasonable measure of change control has also been established (CIS Control 3), vulnerability assessment and remediation begin. Although there is certainly a place for exhaustive vulnerability scanning, it is often not terribly effective without a way to prioritize and complete repairs. An organization of even just a few thousand systems, let alone hundreds of thousands to millions, will be hard-pressed to address every single finding in a timely way. A list of systems and networks prioritized by risk impact is much more appropriate than just a list of all vulnerabilities. Logically, priority will go to systems containing and processing critical information—information that would have a measurable impact on operations if compromised or lost.21 This leads to establishing criteria for prioritization, and is driven by both system and network scanning activities and the inventory-critical information being processed; in other words, a fact-based approach. With the criteria established and systems identified, regular periodic or even continuous scanning should be performed. This approach would also begin to satisfy CIS Control 4. During scanning, pay special attention to internally developed or custom developed applications. These systems are of great concern because they often process, access or control access to an organization’s most critical information. To understand how to perform this testing, we must consider how application security and secure development are handled. 21 SANS ANALYST PROGRAM F or a financial services organization, this information will almost always be the very information that regulators want to see protected. 5 Understanding Security Regulations in the Financial Services Industry Secure Development It’s one thing to say that an organization has strong coding practices; it is an entirely different thing to actually implement such practices. Considering our example in the consent order, we find evidence that Dwolla said publicly and may actually have believed that it was secure and had excellent security practices. According to the stipulated order, a developer leading an application development team had no data security training whatsoever. Further, even though the organization had documented software development practices, those practices were not followed by this team. We also learn that the applications developed by this team apparently handled PII. Organizations must establish secure coding as a culture. Security isn’t something that is added in as an afterthought. Instead, part of the project initiation and specification includes conscious security design, baking in the security from the very beginning. For this to be effective, organizations must identify qualified individuals or organizations that can provide secure development training for developers. This effort aligns with CIS Control 9, which requires skills assessments and supplemental training. Establish effective training as a springboard to a secure development life-cycle program that fits the needs of the business and the style of the developers. Ensure that this process includes both functional testing (delivering the features that are promised) and security testing (delivering reliable, safe code). Code review must also be included, a good amount of which can be handled through automated software but can also include manual code review and pair programming approaches. As effective as these are, however, it would be good to supplement them with penetration testing exercises focused specifically on these applications. Ultimately, the vulnerability scanning process should be leveraged so that identified issues become automated future tests. This process allows for quick and easy regression testing as a part of the vulnerability scanning process. One final critical element for secure development is the segregation of the development, testing and production environments. All security standards that touch on secure coding require that these environments be separated. Further, the development and test environments must never use or have access to actual production data, even old data. Even the administration of these systems must be segregated, with different individuals managing and administering each of these environments. SANS ANALYST PROGRAM 6 Understanding Security Regulations in the Financial Services Industry Establish Policies and Procedures Although this is called out in our road map as a separate activity, policy and procedure creation should be occurring throughout these processes. Considering the Dwolla consent order again, we find that the financial services organization in question “failed to adopt or implement a written data-security plan to govern the collection, maintenance, or storage of consumers’ personal information.”22 For a risk assessment activity to be considered effective, it must identify risks and the organization must then act in some way to control the risk. How the organization reacts is governed by the reasonable and appropriate standard. Not acting at all, however, cannot be appropriate when considering risks to critical systems or information. Management is responsible for measuring overall effectiveness of these controls and the entire process through periodic auditing. This responsibility squarely aligns with the Dwolla consent order, providing a measure of assurance that an organization is approaching the problem of information security correctly.23 Remember the Goal There are many more activities that can be included in an effective application information security program that mitigates risk and supports compliance mandates. Rather than attempt to be exhaustive, remember that the goal is to be effective. Take the provided road map and investigate your own organization. Have all of these issues been addressed? Are there any deficiencies? Are your existing controls reasonable and appropriate given the data being handled, the size of the organization and the age of the enterprise? If you can’t say yes to those questions, you have identified risk within your business, and now you have a tool to help address it. SANS ANALYST PROGRAM 22 http://files.consumerfinance.gov/f/201603_cfpb_consent-order-dwolla-inc.pdf page 7, bullet 29 23 http://files.consumerfinance.gov/f/201603_cfpb_consent-order-dwolla-inc.pdf page 14, bullet 25 7 Understanding Security Regulations in the Financial Services Industry About the Author David Hoelzer is a SANS fellow instructor, courseware author and dean of faculty for the SANS Technology Institute. In addition to bringing the GIAC Security Expert certification to life, he has held practically every IT and security role during his career. David is a research fellow in the Center for Cybermedia Research, the Identity Theft and Financial Fraud Research Operations Center (ITFF/ROC), and the Internet Forensics Lab. Currently, David serves as the principal examiner and director of research for a New York/Las Vegasbased incident response and forensics company and is the chief information security officer for an open source security software solution provider. Sponsor SANS would like to thank this paper’s sponsor: SANS ANALYST PROGRAM 8 Understanding Security Regulations in the Financial Services Industry Last Updated: October 1st, 2016 Upcoming SANS Training Click Here for a full list of all Upcoming SANS Events by Location SANS Seattle 2016 Seattle, WAUS Oct 03, 2016 - Oct 08, 2016 Live Event SANS Oslo 2016 Oslo, NO Oct 03, 2016 - Oct 08, 2016 Live Event SANS Baltimore 2016 Baltimore, MDUS Oct 10, 2016 - Oct 15, 2016 Live Event SANS Tokyo Autumn 2016 Tokyo, JP Oct 17, 2016 - Oct 29, 2016 Live Event SANS Tysons Corner 2016 Tysons Corner, VAUS Oct 22, 2016 - Oct 29, 2016 Live Event SANS San Diego 2016 San Diego, CAUS Oct 23, 2016 - Oct 28, 2016 Live Event SOS SANS October Singapore 2016 Singapore, SG Oct 24, 2016 - Nov 06, 2016 Live Event SANS FOR508 Hamburg in German Hamburg, DE Oct 24, 2016 - Oct 29, 2016 Live Event SANS Munich Autumn 2016 Munich, DE Oct 24, 2016 - Oct 29, 2016 Live Event Pen Test HackFest Summit & Training Crystal City, VAUS Nov 02, 2016 - Nov 09, 2016 Live Event SANS Sydney 2016 Sydney, AU Nov 03, 2016 - Nov 19, 2016 Live Event SANS Gulf Region 2016 Dubai, AE Nov 05, 2016 - Nov 17, 2016 Live Event DEV534: Secure DevOps Nashville, TNUS Nov 07, 2016 - Nov 08, 2016 Live Event SANS Miami 2016 Miami, FLUS Nov 07, 2016 - Nov 12, 2016 Live Event European Security Awareness Summit London, GB Nov 09, 2016 - Nov 11, 2016 Live Event DEV531: Defending Mobile Apps Nashville, TNUS Nov 09, 2016 - Nov 10, 2016 Live Event SANS London 2016 London, GB Nov 12, 2016 - Nov 21, 2016 Live Event Healthcare CyberSecurity Summit & Training Houston, TXUS Nov 14, 2016 - Nov 21, 2016 Live Event SANS San Francisco 2016 San Francisco, CAUS Nov 27, 2016 - Dec 02, 2016 Live Event SANS Hyderabad 2016 Hyderabad, IN Nov 28, 2016 - Dec 10, 2016 Live Event MGT517 - Managing Security Ops Washington, DCUS Nov 28, 2016 - Dec 02, 2016 Live Event ICS410@Delhi New Delhi, IN Dec 05, 2016 - Dec 09, 2016 Live Event SANS Cologne Cologne, DE Dec 05, 2016 - Dec 10, 2016 Live Event SEC 560@ SANS Seoul 2016 Seoul, KR Dec 05, 2016 - Dec 10, 2016 Live Event SANS Dublin Dublin, IE Dec 05, 2016 - Dec 10, 2016 Live Event SANS Cyber Defense Initiative 2016 Washington, DCUS Dec 10, 2016 - Dec 17, 2016 Live Event SANS Amsterdam 2016 Amsterdam, NL Dec 12, 2016 - Dec 17, 2016 Live Event SANS Frankfurt 2016 Frankfurt, DE Dec 12, 2016 - Dec 17, 2016 Live Event SANS DFIR Prague 2016 OnlineCZ Oct 03, 2016 - Oct 15, 2016 Live Event SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced